This blog is sponsored by NEXOR and focuses on Cyber Security issues and market observations, but you will also find the occasional article about small businesses (SMEs) and the IT industry in general.
- Building the Guard - Okay. We’ve analysed the problem, we’ve produced an excellent design, and we’ve got our security approach nailed down. It’s time to get our hands dirty and actually build it. With a good design in place, one might assume that development is a simple task. You just go away and do what it says. But for […]
- Booting Linux Securely - A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning Tree report observed: Of those, Linux got the best overall score The report then looked at the criteria used to […]
- IISP East Midlands: BIS Organisational Standards - On January 29, we held the second IISP meeting in the East Midlands, at the Institute of Directors in Nottingham, attended by close to 30 delegates. The meeting was opened by Colin Powers with an introduction and explanation that some quick reshuffling of the agenda was in order as the main speakers train was running […]
- Nexor Directory Guardian - As readers of this blog will know, NEXOR have recently moved offices. Part of the culture of the new building is a less clutter. The journey involved opening many cupboards and draws that had not seen the light of day for a long time… until now… The following document caught my attention: QUAINT – Quipu Application […]
- UK government urges small businesses to become more “cyber streetwise” - Originally posted on Naked Security:
Hot on the heels of yesterday’s announcement that it’s launched a new £4 million campaign to help raise awareness of cyber security issues, the UK government has today urged small and medium-sized businesses (SMEs) to get more clued-up on cyber security. It stresses that SMEs need to increase their protection…
The issues that are blogged about most are:
- Security awareness for non-technical home users
- Trust and assurance of software and solutions
- People, process and technology triangle
- Secure Information Exchange
The blog is also open to guest contributions, contact Colin Robbins with your suggested topics.